Review

THREATS, VULNERABILITIES AND MEASURES IN ROBOT COMMUNICATION SECURITY: A REVIEW

Volume: 29 Number: 1 March 3, 2026
TR EN

THREATS, VULNERABILITIES AND MEASURES IN ROBOT COMMUNICATION SECURITY: A REVIEW

Abstract

The expansion of networks and the rapid advancement of technology have led to a significant increase in the use of robots across various domains, including robotics, automotive, healthcare, military, and education, thereby bringing numerous security concerns to the forefront. Although it is nearly impossible to completely eliminate security vulnerabilities in robot communication, academia and industry continue to pursue extensive research in this field. This study compiles and organizes recent research in robotics involving network-based, Internet of Things (IoT), Robot Operating System (ROS), and other related approaches, providing a detailed examination of security threats, vulnerabilities, and their conceptual explanations. Furthermore, secure communication protocols, cryptographic methods, and the impact of emerging technologies such as blockchain and edge computing on secure robot communication are discussed. The findings indicate that these evolving technologies hold considerable promise for enhancing the security of robot communications

Keywords

References

  1. Abed, M. S., Al-Doori, Q. F., Abdullah, A. T., & Abdallah, A. A. (2023). Security Vulnerabilities and Threats in Robotic Systems: A Comprehensive Review. International Journal of Safety and Security Engineering, 13(3), 555–563. https://doi.org/10.18280/ijsse.130318
  2. Abeykoon, I., & Feng, X. (2017). A Forensic Investigation of the Robot Operating System. 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 851–857. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.131
  3. Acun, M. F., Daldal, M., & Avci, K. (2023). STM32F407 ve Nodemcu ESP8266 Kartları Kullanarak Kablosuz Çok Yönlü Kontrollü Robotik Araç Sisteminin Geliştirilmesi. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 26(4), 1030–1049. https://doi.org/10.17780/ksujes.1351636
  4. Alquwayzani, A. A., & Albuali, A. A. (2024). A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems. IEEE Access, 12, 176033–176056. https://doi.org/10.1109/ACCESS.2024.3503587
  5. Alsharif, M., Mishra, S., & AlShehri, M. (2022). Impact of Human Vulnerabilities on Cybersecurity. Computer Systems Science and Engineering, 40(3), 1153–1166. https://doi.org/10.32604/csse.2022.019938
  6. Bentayeb, Y., Chaoui, K., & Badir, H. (2025). Integrating Blockchain and Edge Computing: A Systematic Analysis of Security, Efficiency, and Scalability. International Journal of Advanced Computer Science and Applications, 16(1). https://doi.org/10.14569/IJACSA.2025.0160160
  7. Botta, A., Rotbei, S., Zinno, S., & Ventre, G. (2023). Cyber security of robots: A comprehensive survey. Intelligent Systems with Applications, 18, 200237. https://doi.org/10.1016/j.iswa.2023.200237
  8. Brady, M. (1985). Artificial intelligence and robotics. Artificial Intelligence, 26(1), 79–121. https://doi.org/10.1016/0004-3702(85)90013-X

Details

Primary Language

English

Subjects

Information Security Management , Information Security and Cryptology , Data Security and Protection

Journal Section

Review

Publication Date

March 3, 2026

Submission Date

October 7, 2025

Acceptance Date

November 20, 2025

Published in Issue

Year 2026 Volume: 29 Number: 1

APA
Altun, V. C., Ata, B., & Canbay, Y. (2026). THREATS, VULNERABILITIES AND MEASURES IN ROBOT COMMUNICATION SECURITY: A REVIEW. Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi, 29(1), 515-532. https://doi.org/10.17780/ksujes.1798745